1ac decryption - ddi 2015 kq
TRANSCRIPT
-
8/19/2019 1ac Decryption - DDI 2015 KQ
1/32
-
8/19/2019 1ac Decryption - DDI 2015 KQ
2/32
1ac—cybersecurity
A cyberattack is comingMacri, 14
(Giuseppe, staf writer or the Daily Caller, citing NSA head Michael Rogers,“NSA Chie !S "ill Sufer A Catastrophic Cy#erattac$ %n &he Ne't &en ears,)http**dailycaller+co*-./0*//*-/*nsa1chie1us1will1sufer1a1catastrophic1cy#erattac$1in1the1ne't1ten1years*, 2C3
N ational S ecurity A gency and !+S+ Cy#er Coand head Ad+ Michael Rogers warned
lawa$ers during a congressional #rie4ng this wee$ that the U.S. woud su!er a severe
cyberattack against critica in"rastructure ike #ower or "ue grids inthe not1too1distant uture+5 “% ully e'pect that during y tie as a coander, we are going to #e tas$edwith deending critical inrastructure in the !nited States,) Rogers said while citing 4ndings ro an
6cto#er 7ew Research Center report+ “ $t%s ony a matter o" the when, not the i" , that
we%re going to see something dramatic 8 % #et it happens be"ore &'&( +)5
Rogers told the 9ouse %ntelligence Coittee &hursday he e'pected the attac$ to occur during his tenureas head o NSA the !+S+ ilitary:s cy#er1war #ranch, and that it woud li$ely come "rom state)s#onsored hackers with ties to *hina, Russia or se;eral other countries,any o who ha;e already successully #reached the systes o critical !+S+ industries+5 “&here areultiple nation1states that ha;e the capa#ility and ha;e #een on the systes,) Rogers told the coittee,adding that any were engaged in “reconnaissance) acti;ities to sur;eil “speci4c scheatics o ost oour control systes+)5 “&here shouldn:t #e any dou#t in our inds that there are nation1states and groupsout there that ha;e the capa#ility8 to shut down, orestall our a#ility to operate our #asic inrastructure,whether it:s generating power across this nation, whether it:s o;ing water and uel,) Rogers said,
warning China and “one or two others) had already #ro$en into the !+S+ power grid+5 Rogers aso#redicted that in the coing years, cyber criminas pre;iously engaged in stealing #an$,
credit card and other 4nancial data woud start to be co)o#ted by nation)states
to act as +surrogates ,) o#scuring countries: 4ngerprints in the in4ltration and thet oinoration ;alua#le to planning attac$s+5 &he adiral added that such criinal groups, which are otenRussian1spea$ing, ha;e already #een using state1de;eloped cy#er tools+
ackdoors creates vunerabiities that threatencyberin"rastructure - makes attacks ikeyurger et a 14 (ean Cap,Associate proessor at the %ndiana !ni;ersity School o %noration andCoputing, Dan =u#ar, onM 7esha, Carnegie Mellon !ni;ersity, &erry Da;is, MicroSystes AutoationGroup, “Ris$ing %t All !nloc$ing the 2ac$door to the Nation:s Cy#ersecurity,)%
-
8/19/2019 1ac Decryption - DDI 2015 KQ
3/32
address the risks o" instaing backdoors in commercia #roducts,introducing maware and s#yware into #roducts, and weakeningstandards. /e iustrate that these are #ractices that harm
America%s cybersecurity #osture and #ut the resiience o" American
cyberin"rastructure at risk . "e write as a technical society to clariy the potential har
should these strategies #e adopted+ "hether or not these strategies e;er ha;e #een used in practice isoutside the scope o this paper+5 $ndividua com#uter users, large corporations andgo;ernent agencies all de#end on security "eatures buit into in"ormationtechnoogy #roducts and services they buy on the commerciamarket. $" the security "eatures o" these widey avaiabe #roductsand services are weak, everyone is in greater danger . here recentyhave been aegations that U.S. government agencies (and soe pri;ateentities3 have engaged in a nu#er o activities deiberatey intended toweaken ass ar$et, widely used technoogy+ /eakening coercial #roducts andser;ices does have the bene0t that it becomes easier "or U.S.inteigence agencies to conduct surveiance on targets that use the wea$enedtechnology, and ore inoration is a;aila#le or law enorceent purposes+ 6n the surace, it would
appear these oti;ations would #e reasona#le+ 9owe;er, such strategies aso inevitabymake it easier "or "oreign #owers, criminas and terrorists to
in0trate these systems "or their own #ur#oses . Moreo;er, everyone
who uses backdoor technoogies may be vunerabe, and not Iust the handulo sur;eillance targets or !+S+ intelligence agencies+ %t is the opinion o %
-
8/19/2019 1ac Decryption - DDI 2015 KQ
4/32
s#read widey+ &he #ac$doors in that case were a set o secrets then $nown only #y a sall, highlytechnical counity+ A singe, #utativey innocent error resuted in a arge)scae attack that disabed many systems+ %n recent years, arracuda had acom#etey undocumented backdoor that aowed high eves o"access ro the %nternet addresses assigned to 2arracuda+ 9owe;er, when it was pu#liciHed, as alostine;ita#ly happens, it became e6tremey unsa"e, and arracuda%s
customers re9ected it.: ;ne e6am#e o" how attackers can subvertbackdoors placed into systes or #enign reasons occurred in the networ$ o the largestcoercial cellular operator in 2reece+ Switches de#oyed in the system camee3ui##ed with buit)in wireta##ing "eatures, intended ony "orauthorimbassy inGreece #eore the security #reach 4nally was disco;ered+ %n essence, a backdoor created to0ght crime was used to commit crime.
wo scenarios to a cyberattack—
?irst is the grid —a cyberattack causes coa#seReuters 1((Carolyn Cohn, reporter, ?1F1/@, “Cy#er attac$ on !+S+ power grid could costeconoy L/ trillion report,) http**www+reuters+co*article*-./@*.?*.F*us1cy#erattac$1power1sur;ey1id!SCN.7%.S-./@.?.F, 2C3
A cyber attack which shuts down #arts o" the !nited StatesO power grid coud
cost as uch as L 1 triion to the !+S+ econoy, according to a re#ort pu#lished on"ednesday+5 Copany e'ecuti;es are worried a#out security #reaches, #ut recent sur;eys suggest they
are not con;inced a#out the ;alue or efecti;eness o cy#er insurance+5 &he report ro
theUniversity o" *ambridge *entre "or Risk Studies and the =loydOs o =ondoninsurance ar$et outlines a scenario o an electricity #lac$out that lea;es P illion people in New or$
City and "ashington DC without power+5 he scenario , deveo#ed by *ambridge, is
technoogicay #ossibe and is assessed to #e within the once1in1-..1year pro#a#ility or
which insurers should #e prepared, the report said+5 he hy#othetica attack causes a
rise in mortaity rates as heath and sa"ety systems "ai , a dro# in
trade as #orts shut down and disru#tion to trans#ort and
in"rastructure .5 Q&he total ipact to the !+S+ econoy is estiated at L-0 #illion, rising to orethan L/ trillion in the ost e'tree ;ersion o the scenario,Q the report said+ &he losses coe rodaage to inrastructure and #usiness supply chains, and are estiated o;er a 4;e1year tie period+5 &he
e'tree scenario is #uilt on the greatest loss o power, with /.. generators ta$en oine, and would leadto insurance industry losses o ore than L?. #illion, the report added+5 here have been 1(sus#ected cyber attacks on the U.S. eectricity grid since &''', thereport said, citing !+S+ energy departent data+5 &he !+S+ %ndustrial Control Syste Cy#er
-
8/19/2019 1ac Decryption - DDI 2015 KQ
5/32
An attack decimates US in"rastructure within 1( minutesN@ 1'(Michi$o a$utani, 7ulitHer 7riHe winning #oo$ re;iewer, citing Richard Clar$e,orer National Coordinator or Security, %nrastructure 7rotection, andCounter1terroris or the !nited States, 01-?1/.,
http**www+nyties+co*-./.*.0*-?*#oo$s*-?#oo$+htlBpagewantedall,2C3
ackouts hit New @ork, os Angees, /ashington and more than
1'' other American cities . Subways crash. rains derai. Air#anes
"a "rom the sky.5 2as #i#eines e6#ode. *hemica #ants reease
couds o" to6ic chorine . anks ose a their data. /eather and
communication sateites s#in out o" their orbits. And the
=entagon%s cassi0ed networks grind to a hat , binding the
greatest miitary #ower in the word.5 &his ight sound li$e a ta$eof on the -..? 2ruce "illis “Die 9ard) o;ie, inwhich a group o cy#erterrorists attepts to stage what it calls a “4re sale) a systeatic shutdown o the nation:s ;ital counication and utilities inrastructure+
According to the orer
counterterrorism c
-
8/19/2019 1ac Decryption - DDI 2015 KQ
6/32
history ay #e ore instructi;e than e;er+ "hile we continue to #elie;e that the GreatDepression is not li$ely to #e repeated, the lessons to #e drawn ro that period include the harulefects on edgling deocracies and ultiethnic societies (thin$ Central
-
8/19/2019 1ac Decryption - DDI 2015 KQ
7/32
to #revent core metdown .E %n >apan, it was a one1two punch 4rst the earthJua$e, then the tsunai+ &o$yo apan, arenOt so sure+ %n the worst1case scenario, the NRCOs /PP.ris$ assessent predicted that a core met at =each ottom coud begin in one hour i"eectrica #ower on) and o!)site were ost, the diese generators -the main back)u# source o" #ower "or the #um#s that kee# the corecoo with water - "aied to work and other mitigating ste#s werenIt
taken. E$t is not a 3uestion that those things are de0nitey e!ectivein this kind o" scenario,E said Richard Denning, a proessor o nuclear engineering at 6hio State !ni;ersity, reerring to the steps NRC has ta$en to pre;entincidents+ Denning had done wor$ as a contractor on se;ere accident analyses or the NRC since /P?@+ 9e retired ro 2attelle Meorial %nstitute in /PP@+ Q&hey certainly could ha;e ade all the diference in thisparticular case,Q he said, reerring to >apan+ Q&hatOs assuing you ha;e stored these things in a place that would not ha;e #een swept away #y tsunai+Q
Nucear metdowns cause e6tinctionendman */*11 V 2A ro 9ar;ard !ni;ersity and M2A ro "hartonSchool at the !ni;ersity o 7ennsyl;ania (Stephen, “Nuclear Meltdown in
>apan) Rense, http**rense+co*generalP*nucelt+ht3
Kor years, 9elen Caldicott warned itOs coing+ %n her /P?F #oo$, QNuclear Madness,Q she said QAs a physician, % contend that nucear
technoogy threatens i"e on our #anet with e6tinction . $" #resent
trends continue, theair we breathe, the "ood we eat, and the water
we drink wi soon becontaminated with enough radioactive#outants to #ose a #otentia heath ha
-
8/19/2019 1ac Decryption - DDI 2015 KQ
8/32
metdown, its #otentia catastro#hic e!ects "ar e6ceeding 3uake andtsunami devastation, amost minor by com#arison under a worstcase scenario. 6n March /-, &ies wri ter Matthew "ald headlined, Q
-
8/19/2019 1ac Decryption - DDI 2015 KQ
9/32
his #a#er wi anayse the threat o" cyber terrorism in regard tonucear wea#ons. Speci4cally, this research will use open source $nowledge to identiy thestructure o nuclear coand and control centres, how those structures ight #e coproised throughcoputer networ$ operations, and how doing so would 4t within esta#lished cy#er terrorists: capa#ilities,
strategies, and tactics+ $" access to command and contro centres is obtained,
terrorists coud "ake or actuay cause one nucear )armed state to
attack another , thus #rovoking a nucear res#onse "rom another
nucear #ower. his may be an easier aternative "or terrorist grou#s
than buiding or ac3uiring a nucear wea#on or dirty bombthemseves. his woud aso act as a "orce e3uaiser, and #rovideterrorists with the asymmetric bene0ts o" high s#eed, remova o"geogra#hica distance, and a reativey ow cost. Continuing diHcuties indeveo#ing com#uter tracking technoogies which coud trace theidentity o" intruders, and diHcuties in estabishing an internationally agreedupon ega "ramework to guide res#onses to coputer networ$ operations, #ointtowards an inherent weakness in using com#uter networks tomanage nucear wea#onry+ his is #articuary reevant to reducing
the hair trigger #osture o" e6isting nucear arsenas .L A com#uterswhich are connected to the internet are susce#tibe to in0trationand remote contro. Coputers which operate on a closed networ$ ay also #e coproised#y ;arious hac$er ethods, such as pri;ilege escalation, roaing note#oo$s, wireless access points,e#edded e'ploits in sotware and hardware, and aintenance entry points+ Kor e'aple, e1ail spoo4ngtargeted at indi;iduals who ha;e access to a closed networ$, could lead to the installation o a ;irus on anopen networ$+ &his ;irus could then #e carelessly transported on reo;a#le data storage #etween theopen and closed networ$+ %noration ound on the internet ay also re;eal how to access these closed
networ$s directly+ >!orts by miitaries to #ace increasing reiance oncom#uter networks , incuding e6#erimenta technoogy such asautonomous systems, and their desire to have muti#e auncho#tions, such as nucear triad ca#abiity, enabes muti#e entry#oints "or terrorists+ Kor e'aple, i a terrestrial coand centre is ipenetra#le, perhaps
isolating one nuclear ared su#arine would pro;e an easier tas$+ &here is e;idence to suggest ultipleattepts ha;e #een ade #y hac$ers to coproise the e'treely low radio reJuency once used #y the!S Na;y to send nuclear launch appro;al to su#erged su#arines+ Additionally, the alleged So;ietsyste $nown as 7erietr was designed to autoatically launch nuclear weapons i it was una#le toesta#lish counications with So;iet leadership+ &his was intended as a retaliatory response in the e;entthat nuclear weapons had decapitated So;iet leadershipX howe;er it did not account or the possi#ility ocy#er terrorists #loc$ing counications through coputer networ$ operations in an attept to engage
the syste+ Y Shoud a warhead be aunched, damage coud be "urtherenhanced through additiona com#uter network o#erations. 2y usingpro'ies, muti)ayered attacks coud be engineered . &errorists could reotelycoandeer coputers in China and use the to launch a !S nuclear attac$ against Russia+ &hus Russiawould #elie;e it was under attac$ ro the !S and the !S would #elie;e China was responsi#le+ Kurther,
emergency res#onse communications coud be disru#ted,trans#ortation coud be shut down , and disin"ormation , such asmisdirection, coud be #anted, thereby hindering the disaster reie"
e!ort and ma6imi
-
8/19/2019 1ac Decryption - DDI 2015 KQ
10/32
-
8/19/2019 1ac Decryption - DDI 2015 KQ
11/32
1ac—heg
ackdoors destroy US tech innovation andcom#etitiveness
ohn 14(Cindy, writer or the
-
8/19/2019 1ac Decryption - DDI 2015 KQ
12/32
weIre 9ust handing business over to "oreign com#anies who donIt
have such imitations + Nokia, Siemens, and >ricsson woud a be
ha##y to take a hea#ing share o" the communications technoogybusiness "rom US com#anies+ And itOs not Iust teleco carriers and W6%7 pro;iders at ris$+ Manygame consoes that #eo#e can use to #ay over the $nternet, such as
the Pbo6, aow gamers to chat with each other whie they #ay.heyId have to be ta##abe, too.
ata #rovesoomberg, 1C(Allan 9oles, staf writer, P1/.1/, “NSA Spying Seen Ris$ing 2illions in !+S+
&echnology Sales,) http**www+#loo#erg+co*news*articles*-./1.P1/.*nsa1spying1seen1ris$ing1#illions1in1u1s1technology1sales, 2C3
Reports that the National Security Agency #ersuaded soe !+S+ technoogy
com#anies to buid so1called backdoors into security products, networ$s and de;ices toallow easier sur;eillance are siilar to how the 9ouse %ntelligence Coittee descri#ed the threat posed
#y China through 9uawei+5 >ust as the ShenHhen, China1#ased 9uawei lost #usiness ater the report urged!+S+ copanies not to use its eJuipent, the NSA discosures may reduce !+S+technoogy saes overseas by as much as Q18' biion, or &( #ercent o" in"ormation technoogy services, #y -./E, according to ?orrester
Research $nc+, a research group in Ca#ridge, Massachusetts+5 “ he Nationa Security
Agency wi ki the U.S. technoogy industry singehandedy ,) Ro#
>ndere, a technoogy anayst in San >ose, Caliornia, said in an inter;iew+ “&hesecopanies ay #e Iust dealing with the diUculty in eeting our nu#ers through the end o the decade+)5%nternet copanies, networ$ eJuipent anuacturers and encryption tool a$ers recei;e signi4cantshares o their re;enue ro o;erseas copanies and go;ernents+5 Cisco Systes %nc+, the world:s#iggest networ$ing eJuipent a$er, recei;ed 0- percent o its L0E+/ #illion in 4scal -./- re;enue rooutside the !+S+, according to data copiled #y 2loo#erg+ Syantec Corp+, the #iggest a$er ocoputer1security sotware #ased in Mountain Wiew, Caliornia, reported 0E percent o its 4scal -./
re;enue o LE+P #illion ro ar$ets other than the !+S+, Canada and =atin Aerica+5 %ntel Corp+, theworld:s largest seiconductor a$er, reported F0 percent o its L@+ #illion in 4scal -./- re;enue caero outside the !+S+, according to data copiled #y 2loo#erg+5 Z
-
8/19/2019 1ac Decryption - DDI 2015 KQ
13/32
ech eadershi# in the #rivate sector is uni3uey key tohegSega 4(Ada, director o the 7rogra on Digital and Cy#erspace 7olicy at theCouncil on Koreign Relations (CKR3, An e'pert on security issues, technology
de;elopent, No;e#er*Dece#er -..0 %ssue, “%s Aerica =osing %ts
-
8/19/2019 1ac Decryption - DDI 2015 KQ
14/32
-
8/19/2019 1ac Decryption - DDI 2015 KQ
15/32
ways decision a$ers identiy with the states they represent ay proptthe to rae issues as positional disputes o;er status in a social hierarchy+ %de;elop hypotheses that tailor this scholarship to the doain o great power politics, showing how the pro#a#ilityo status copetition is li$ely to #e lin$ed to polarity+ &he rest o the article in;estigateswhether there is suUcient e;idence or these hypotheses to warrant urther re4neent and testing+ % pursue this in three
ways #y showing that the theory ad;anced here is consistent with what we $now a#out
arge)scae #atterns o" great #ower conict through history X #y ]
-
8/19/2019 1ac Decryption - DDI 2015 KQ
16/32
easi#le di;isions o the atter in dispute e;en when ailing to do so iposes highcostsX deands on the part o states or o#ser;a#le e;idence to con4r their estiate o an ipro;ed position in thehierarchyX the ina#ility o pri;ate #argains to resol;e issuesX a reJuently o#ser;ed copulsion or thepu#lic attainent o concessions ro a higher ran$ed stateX and stu##orn resistance on the part o states towhich such deands are addressed e;en when acJuiescence entails liited aterial cost+
&he literature on #argaining ailure in the conte't o power shits reains inconclusi;e, and it is preature to ta$e anyepirical pattern as necessarily pro#ati;e+ %ndeed, Ro#ert 7owell has recently proposed that indi;isi#ility is not arationalistic e'planation or war ater all ully rational leaders with perect inoration should preer to settle a disputeo;er an indi;isi#le issue #y resorting to a lottery rather than a war certain to destroy soe o the goods in dispute+ "hatight pre;ent such #argaining solutions is not indi;isi#ility itsel, he argues, #ut rather the parties: ina#ility to coit toa#ide #y any agreeent in the uture i they e'pect their relati;e capa#ilities to continue to shit+-- &his is the credi#lecoitent pro#le to which any theorists are now turning their attention+ 2ut how it relates to the inorationpro#le that until recently doinated the oral literature reains to #e seen+- &he larger point is that positionalconcerns or status ay help account or the puHHle o #argaining ailure+ %n the rational choice #argaining literature, waris puHHling #ecause it destroys soe o the #ene4ts or ows o #ene4ts in dispute #etween the #argainers, who would #e#etter of di;iding the spoils without war+ et what happens to these odels i what atters or states is less the ows oaterial #ene4ts thesel;es than their iplications or relati;e statusB &he salience o this Juestion depends on the
relati;e iportance o positional concern or status aong states+ Do Great 7owers Care a#out StatusB Mainstreatheories generally posit that states coe to #lows o;er an international status Juoonly when it has iplications or their security or aterial well1#eing+ &he guidingassuption is that a state:s satisaction ]
-
8/19/2019 1ac Decryption - DDI 2015 KQ
17/32
the !+S+ hoeland and Aerican glo#al interests+ &hese interests include ensuring that critical resources li$e oil ow around the world, that the glo#al trade and onetary regies ourish and that"ashingtonOs worldwide networ$ o allies is reassured and protected+ Allies are a great asset to the !nited States, inpart #ecause they shoulder soe o its #urdens+ &hus, it is no surprise to see NA&6 in Aghanistan or the Australiansin
-
8/19/2019 1ac Decryption - DDI 2015 KQ
18/32
!+S+ leadership reduced riction aong any states that were historical antagonists, ost
nota#ly Krance and "est Gerany+ &oday, Aerican priacy helps $eep a nu#er ocoplicated rela tionships aligned 1 1#etween Greece and &ur$ey, %srael andapan, %ndia and 7a$istan , %ndonesia and Australia+ &his is notto say it ul4lls "oodrow "ilsonOs ;ision o ending all war+ "ars still occur where "ashingtonOs interests are not
seriously threatened, such as in Darur, #ut a 7a' Aericana does reduce warOs li$elihood,
particularly warOs worst or great power wars+ Second, Aerican power gi;es the !nitedStates the a#ility to spread deocracy and other eleents o its ideology o li#eralis+ Doing so is asource o uch good or the countries concerned as well as the !nited States #ecause, as >ohn 6wen noted on thesepages in the Spring -..E issue, li#eral deocracies are ore li$ely to align with the !nited States and #e sypathetic
to the Aerican world;iew+ So, spreading deocracy helps aintain !+S+ priacy+ %n addition, once states arego;erned deocratic ally, the li$elihood o any type o conict is signi4cantlyreduced+ &his is not #ecause deocracies do not ha;e clashing interests+ %ndeed they do+ Rather, it is #ecausethey are ore open, ore transparent and ore li$ely to want to resol;e things aica#ly inconcurrence with !+S+ lead ership+ And so, in general, deocratic states are good or their citiHens aswell as or ad;ancing the interests o the !nited States+ Critics ha;e aulted the 2ush Adinistration or attepting tospread deocracy in the Middle
-
8/19/2019 1ac Decryption - DDI 2015 KQ
19/32
1ac—#an
he United States "edera government shoud ban thecreation and surveiance o" backdoors as outined in the
Secure ata Act o" &'1(.
-
8/19/2019 1ac Decryption - DDI 2015 KQ
20/32
-
8/19/2019 1ac Decryption - DDI 2015 KQ
21/32
announced !+S+ Departent o >ustice Cy#ersecurity !nita unit designedsolely to “deter, in;estigate, and prosecute cy#er criinals,) should wor$ incooperation with the pri;ate sector to create a saer en;ironent online+ Achange o" course is aso necessary to restore the abiity o" U.S. tech
com#anies to com#ete gobay , where istrust has run rapant
ollowing the re;elations o ass go;ernent sur;eillance+5
"ith the //thCongress at an end, "yden has proised to reintroduce the Data Secure Actagain in the ne't Congress+ Congress should o;e e'pediently to ad;anceSenator "yden:s #ill to proote security and pri;acy in !+S+ de;ices andsotware+ Kurtherore, as Congress ar$s up the legislation and considersaendents, it should restrict not Iust go;ernent access to de;ices, #utalso go;ernent control o those de;ices+ &hese eforts will o;e the efortso our law enorceent agencies away ro creating cy#er ;ulnera#ilities andallow electronics anuacturers to produce the ost secure de;icesiagina#le+
*osing backdoors strengthens digita security—thatdoesn%t trade o! with aw en"orcement #rioritiesankston 1((e;in 2an$ston is the Director o New Aerica:s 6pen &echnology %nstituteand Co1Director o New Aerica:s Cy#ersecurity %nitiati;e, ?1?1/@, “%t:s &ieto
-
8/19/2019 1ac Decryption - DDI 2015 KQ
22/32
the coud. So, the #ur#orted aw en"orcement need is even ess
com#eing than it was in the 7's + Meanwhile, the security iplications o trying toandate #ac$doors throughout the ;ast ecosyste o digital counications ser;ices ha;e only gottenore dire in the inter;ening years, as laid out in an e'hausti;e new report issued Iust this orning #y o;era doHen hea;y1hitting security e'perts+5 esterday, Coey conceded that ater a eaningul de#ate, it ay#e that we as a people decide that the #ene4ts o widespread encryption outweigh the costs and that
there:s no sensi#le, technically easi#le way to guarantee go;ernent access to encrypted data+ 2ut theact is that we had that de#ate -. years ago, and we:;e #een ha;ing it again or nearly a year+ "e are nottal$ing past each otherX a wide range o ad;ocates, industry sta$eholders, policya$ers, and e'perts has#een spea$ing directly to Coey:s arguents since last all+ 9opeully he will soon start listening, ratherthan dooing us to repeat the ista$es o the past and dragging us into another round o Crypto "ars+5
/e have aready had the debate that *omey says he wants. Athat%s e"t is "or him to admit that he%s ost.
-
8/19/2019 1ac Decryption - DDI 2015 KQ
23/32
Misc
-
8/19/2019 1ac Decryption - DDI 2015 KQ
24/32
#oitics ink turns
he Secure ata Act is overwhemingy bi#artisanoournal, /-101/0, “9ouse =awa$ers toReintroduce 2ill to =iit NSA O2ac$doorO Spying,)http**www+nationalIournal+co*tech*house1lawa$ers1to1reintroduce1#ill1to1end1nsa1#ac$door1e'ploits1-./0/-.0, 2C35ouse awmakers are attem#ting to revive a popular #ill that would liit theNational Security AgencyOs a#ility to spy on AericansO counications data, a day ater the easure was
let out ro ongoing go;ernent unding negotiations+5 &he easure, du##ed the Secure ataAct and spearheaded #y Deocratic Rep+ `oe =ogren, woud bock the NSA and other intelligenceagencies ro copelling tech copanies to create so1called backdoor vunerabiities intotheir de;ices or sotware+ Sen+ Ron "yden, also a Deocrat, introduced a siilar ;ersion o the #ill earlier
&hursday+5 A =ogren aide said the #ill is e'pected to #e introduced later &hursday with Repu#lican
cosponsors+5 A broader "orm o" the egisation overwhemingy #assed
the 5ouse in Fune with bi#artisan su##ort on a &7C)1&C vote, in the oro an aendent tac$ed on to a deense appropriations #ill+ &hat pre;ious #ill additionally would ha;epre;ented intelligence agencies ro engaging in content sur;eillance o AericansO counications datawithout a warrant+5 2ut the language was let out o ongoing negotiations #etween #oth cha#ers o;er aspending pac$age that would und ost go;ernent agencies into ne't year+ &he 9ouse has additionally
#arred aendents to that oni#us easure, a coon practice+5 6n &hursday, C' civi)ibertiesgrou#s o" both ibera and conservative eanings wrote to 5ouseeadershi# to urge it to retain the #ro#osa as #art o" its "unding#ackage.5 QKailing to include this aendent in the orthcoing K/@ oni#us will send a clearessage to Aericans that Congress does not care i the NSA searches their stored counications or ithe go;ernent pressures Aerican technology copanies to #uild ;ulnera#ilities into their products thatassist in NSA sur;eillance,Q read the letter, whose signatories include the
-
8/19/2019 1ac Decryption - DDI 2015 KQ
25/32
coittee, which is Q#asically a pro'y or the intelligence counity,) as >ulian SancheH o the Cato
%nstitute e'plained to "ired+5 he amendment sti has to be a##roved by theSenate in order to take e!ect in &'1(.
he Secure ata Act is bi#artisan>??, 14
(
-
8/19/2019 1ac Decryption - DDI 2015 KQ
26/32
sovency shit
UN e6#erts agree bruhaye, #ro" aw, 1(
(Da;id, !N Special Rapporteur on the prootion and protection o the right toreedo o opinion and e'pression, clinical proessor o law at the !ni;ersityo Caliornia, %r;ine, School o =aw+ “Report o the Special Rapporteur on theprootion and5 protection o the right to reedo o opinion and e'pression,)@1--1/@, http**Iustsecurity+org*wp1content*uploads*-./@*.E*aye19RC1Report1
-
8/19/2019 1ac Decryption - DDI 2015 KQ
27/32
(2ruce, cy#ersecurity e'pert, ellow at the 2er$an Center or %nternet andSociety at 9ar;ard =aw School, a progra ellow at the New AericaKoundationOs 6pen &echnology %nstitute, “Stop the hysteria o;er Appleencryption,) http**www+cnn+co*-./0*/.*.*opinion*schneier1apple1encryption1hysteria*, 2C3
aw en"orcement has been com#aining about Egoing dark Q or decadesnow+ %n the /PP.s, they con;inced Congress to pass a law reJuiring phone copanies to ensure that phone
calls would reain tappa#le e;en as they #ecae digital+ hey tried and ailed to #an strongencryption and mandate back doors or their use+ &he K2% tried and ailed again to #an strong
encryption in -./.+ Now, in the post1Snowden era, theyOre a#out to try again+5 /e need to 0ght
this. Strong encry#tion #rotects us "rom a panoply o threats+ %t protects us ro
hackers and criminas+ %t protects our #usinesses ro copetitors and oreign spies+ %tprotects people in totalitarian go;ernents ro arrest and detention+ &his isnOt Iust e tal$ing &he K2%
also recoends you encrypt your data or security+5 As "or aw en"orcement W herecent decades have given them an un#recedented abiity to #ut usunder surveiance and access our data+ ;ur ce #hones #rovide them with adetaied history o our o;eents. ;ur ca records, e)mai history, buddyists, and ?acebook #ages te them who we associate with . hehundreds o" com#anies that track us on the $nternet te them whatweIre thinking about. Ubi3uitous cameras ca#ture our "aces
everywhere . And most o" us back u# our i=hone data on i*oud,
which the ?$ can sti get a warrant "or. $t truy is the goden age o"
surveiance.
&'1( Secure ata Act coses backdoors
Nichos &D( (-*@*/@ Shaun Nichols “!S anti1#ac$door #ill % at 4rst youOreshot down in aes V try, try againSecond Secure Data Act #id hopes to $eep !ncle Sa ro tappingo#es, gadgets,etc)http**www+theregister+co+u$*-./@*.-*.@*uslawa$ersta$eanothershotat#ac$door#usting#ill*3
awmakers in the US are making an e!ort to revive egisationthat woud ban government agencies "rom demanding backdooraccess to hardware, websites and so"tware+Y Under the #ro#osedSecure ata Act, deveo#ers cannot be "orced to insert securityhoes into devices and code . he ?$, or one, woud ike to usesuch aws to hiIac$ phones and other gadgets, view their contentsand snoo# on their owners - hackers woud ike to use thesevunerabiities, too .L &he #ill is sponsored #y >i Sensen#renner (R1"%3, `oe =ogren (D1CA3 and &hoas Massie (R13, and wasreintroduced into the 9ouse o Representati;es on "ednesday+ =astyearOs attept, which died at the su#coittee stage, can #e oundhere, and sought to Qprohi#it ederal agencies ro andating thedeployent o ;ulnera#ilities in data security technologies+QY Q*ongresshas aowed the administration%s surveiance authorities to gounchecked by "aiing to enact ade3uate re"orm,Q the trio said in a
http://www.theregister.co.uk/2015/01/29/china_pushes_mandatory_backdoors/http://thomas.loc.gov/cgi-bin/query/z?c113:H.R.5800:http://thomas.loc.gov/cgi-bin/query/z?c113:H.R.5800:http://lofgren.house.gov/news/documentsingle.aspx?DocumentID=397873http://www.theregister.co.uk/2015/01/29/china_pushes_mandatory_backdoors/http://thomas.loc.gov/cgi-bin/query/z?c113:H.R.5800:http://thomas.loc.gov/cgi-bin/query/z?c113:H.R.5800:http://lofgren.house.gov/news/documentsingle.aspx?DocumentID=397873
-
8/19/2019 1ac Decryption - DDI 2015 KQ
28/32
stateent this wee$, announcing the reintroduction o the #ill to the9ouse+Y Q"ith threats to our hoeland e;er pre;alent, we should not tiethe hands o the intelligence counity+ 2ut unwarranted, backdoorsurveiance is inde"ensibe.L E he Secure ata Act is anim#ortant ste# in rebuiding #ubic trust in our inteigenceagencies and striking the a##ro#riate baance between nationa
security and civi iberty.E
-
8/19/2019 1ac Decryption - DDI 2015 KQ
29/32
$m#acts
*yber)terror causes accidenta nucear war >ason ?rit< 7, Korer Captain o the !+S+ Ary, >uly, 9ac$ing Nuclear
Coand and Control,www+icnnd+org*Docuents*>asonKritH9ac$ingNC-+doc
&he !S uses the two1an rule to achie;e a higher le;el o security in nuclear afairs+ !nder this rule two authoriHedpersonnel ust #e present and in agreeent during critical stages o nuclear coand and control+ &he 7resident ust
Iointly issue a launch order with the Secretary o DeenseX Minutean issile operators ust agree that the launch orderis ;alidX and on a su#arine, #oth the coanding oUcer and e'ecuti;e oUcer ust agree that the order to launch is;alid+ %n the !S, in order to e'ecute a nuclear launch, an
-
8/19/2019 1ac Decryption - DDI 2015 KQ
30/32
incorrect inoration to #e transitted , recei;ed, or displayed at nuclear
c oand and c ontrol centres , or shut down these centres: coputer
networ$s copletely . $n 177(, a Norwegian scienti0c sounding rocketwas mistaken by Russian eary warning systems as a nucear missieaunched "rom a US submarine+ A radar operator used ro$us to notiy a general on duty whodecided to alert the highest le;els+ a;$aH was ipleented, all three chegets acti;ated, and
the countdown"or a nucear decision began+ %t too$ eight inutes #eore the issile was properly identi4edaconsidera#le aount o tie considering the speed with which a nuclear response ust #e decided upon (Atergood
-...3+Y Creating a alse signal in these early warning systes would #e
reativey easy using coputer networ$ operations+ &he real diUculty would #e gaining
access to these systes as they are ost li$ely on a closed networ$+ 9owe;er, i they are transittingwirelessly, that ay pro;ide an entry point, and inoration gained throughthe internet ay re;eal the details, such as passwords and sotware, orgaining entrance to the closed networ$+ % access was o#tained, a alse alar could #eollowed #y soething li$e a DDoS attac$, so the operators #elie;e an attac$ ay #e iinent,
yet they can no longer ;eriy it+ &his could add #ressure to the decision making
#rocess, and i" coordinated #recisey, coud a##ear as a 0rst round
>M= burst. errorist grou#s coud aso attem#t to launch a non1nuclearissile, such as the one used #y Norway, in an attept to "oo the system + he
number o" states who #ossess such technoogy is "ar greater thanthe number o" states who #ossess nucear wea#ons. ;btaining them
woud be consideraby easier , es#eciay when enhancing o#erations
through com#uter network o#erations. Co#ining traditional terroristethods with cy#er techniJues opens opportunities neither could accoplishon their own+ Kor e'aple, radar stations ight #e ore ;ulnera#le to a coputerattac$, while satellites are ore ;ulnera#le to Iaing ro a laser #ea,thus together they deny dual phenoenology+ Mapping counicationsnetwor$s through cy#er reconnaissance ay e'pose wea$nesses, and
autoated scanning de;ices created #y ore e'perienced hac$ers can #ereadily ound on the internet+Y %ntercepting or spoo4ng counications is a highly cople' science+ &hese systes are designed to protect against the world:s ost powerul and well unded ilitaries+ et, there arerecurring gafes, and the ;ery nature o asyetric warare is to #ypass cople'ities #y 4nding siple loopholes+ Kore'aple, coercially a;aila#le sotware or ;oice1orphing could #e used to capture ;oice coands within thecoand and control structure, cut these sound #ytes into phonees, and splice it #ac$ together in order to issue alse;oice coands (Andersen -../, Chapter /E3+ Spoo4ng could also #e used to escalate a ;olatile situation in the hopes ostarting a nuclear war+ “ Xthey cut o! the #aragra#hY “%n >une /PPF, a group o international hac$ers calling thesel;esMilw.r hac$ed the we# site o %ndia:s 2ha#ha Atoic Research Center (2ARC3 and put up a spooed we# page showing a
ushroo cloud and the te't “% a nucear war does start , you will #e the 4rst to screa) (Denning/PPP3+ 9ac$er we#1page deaceents li$e these are oten derided #y critics o cy#er terroris as siply #eing a nuisancewhich causes no signi4cant har+ 9owe;er, we#1page deaceents are #ecoing ore coon, and they point towardsalaring possi#ilities in su#;ersion+ During the -..? cy#er attac$s against
-
8/19/2019 1ac Decryption - DDI 2015 KQ
31/32
a study commissioned by the $nternationa *ommission on NucearNon)#roi"eration and isarmament (%CNND3, which suggests that underthe right circumstances, terrorists coud break into com#uter
systems and aunch an attack on a nucear state - triggering a
catastro#hic chain o" events that woud have a goba im#act . L
/ithout better #rotection o" com#uter and in"ormation systems, thepaper suggests, governments around the word are eaving o#en the#ossibiity that a we)coordinated cyberwar coud 3uicky eevate to
nucear eves . L %n act, says the study, Qthis may be an easier aternative "or
terrorist grou#s than buiding or ac3uiring a nucear wea#on or dirtybomb themsevesQ+Y &hough the paper adits that the edia and entertainent industries otenconuse and e'aggerate the ris$ o cy#erterroris, it also outlines a nu#er o potential threats and
situations in which dedicated hackers coud use in"ormation war"aretechni3ues to make a nucear attack more ikey. L "hile the possi#ility o aradical group gaining access to actual launch systes is reote, the study suggests thathackers coud "ocus on "eeding in "ase in"ormation "urther down thechain - or s#reading "ake in"ormation to oHcias in a care"uy
orchestrated strike. L QDespite clais that nuclear launch orders can only coe ro the highestauthorities, numerous e6am#es #oint towards an abiity to sideste# thechain o" command and insert orders at ower eves,Q said >ason KritH, theauthor o the paper+ Q*yber)terrorists coud aso #rovoke a nucear aunch bys#oo0ng eary warning and identi0cation systems or by degradingcommunications networks.E
*yberattacks on the US trigger nucear retaiationidde, 1C(Sa, writer or GiHodo and citing the 7entagon, “7entagon =etOs &hreatenNu$e Stri$e Against 9ac$ers,) 1E1/, http**giHodo+co*@PFFP/0*pentagon1lets1threaten1nu$e1stri$e1against1hac$ers, 2C3
Most o us are content $eeping hac$ers away with a 4rewall and decent password+ 2ut the=entagon isnOt nearly content, and in a new re#ort, insists we shoud kee# ournucear arsena ready "or $nternet retaiation+ "hat could go wrongB5 &he report,QResilient Military Systes and the Ad;anced Cy#er &hreat,Q was prepared #y the Departent o DeenseOs
Deense Science 2oard, and o;er the course o /F pages a$es one ;ery clear point i" *hina everhacks us, Q=rotect the Nucear Strike as a eterrent+Q &he phrase is repeatedagain and againthe word QnuclearQ appears // ties in a report ostensi#ly dealing with coputerwarare+ &he entire thing is riddled with Iargon, eupheis, and rosy ilitary etaphorcli#ing the
ladder o deterrence_#ut the notion that American nukes coud ( and
shoudZK be #art o" the Ecyber warE e3uation (and insulated against any
electronic disruption3 is une3uivoca + =etOs put it plainly China should $now that we ha;e nu$es,
tons o Oe, and i" *hinaIs stellar hacker #atoons ever tried to , say, bring downan American sateite, destabii
-
8/19/2019 1ac Decryption - DDI 2015 KQ
32/32
the !nited States as Oe'tree circustances+OQ"aitwhatOs a &ier W1W% ad;ersary cy#er attac$B &hatOssiple QStates with the a#ility to successully e'ecute ull spectru (cy#er capa#ilities in co#ination withall o their ilitary and intelligence capa#ilities3 operations to achie;e a speci4c outcoe in political,ilitary, econoic, etc+ doains+Q
*yber attacks wi#e)out the US miitary)))causes nucearwarRo#ert i"ord 1&, Graduate !S Ary Air#orne School, Kt+ 2enning,Georgia, “Cy#er attac$ers could shut down the electric grid or the entire eastcoast) -./-, http**www+e'ainer+co*article*cy#er1attac$ers1could1easily1shut1down1the1electric1grid1or1the1entire1east1coa we don:t agree with thea#leist language
&o a$e atters worse a cyber attack that can take out a civiian #ower grid, or
e'aple coud also cri##e the U.S. miitary +Y &he senator notes that is that the sae
#ower grids that su##y cities and towns, stores and gas stations, cell
towers and heart onitors also #ower “ every miitary base in our country+)Y “Although
bases woud be #re#ared to weather a short power outage with backu# dieselgenerators, within hours, not days, uel su##ies woud run out), he said+Y "hich eans
miitary c ommand and c ontro centers coud go dark +Y Radar
systems that detect air threats to our country woud shut own copletely+Y “*ommunication between commanders and their troo#s woud also gosient+ And many wea#ons systems woud be e"t without either uel or
eectric #ower), said Senator 2rassey+Y “So in a "ew short hours or days,
the mightiest miitary in the word woud be e"t scrambing tomaintain base "unctions), he said+Y /e contacted the =entagon and
oHcias con0rmed the threat o" a cyber attack is something very
rea +Y o# nationa security oHciasincluding the Chairan o the >oint Chies, the Director o
the National Security Agency, the Secretary o Deense, and the C%A Director have said, “#reventing acyber attack and ipro;ing the nation:s electric grids is aong the most urgent #riorities o our country) (source Congressional Record3+Y So how serious is the 7entagon ta$ing all thisBY